Fischer et al., 2004 - Google Patents
Privacy from untrusted web serversFischer et al., 2004
View PDF- Document ID
- 12351232525314471420
- Author
- Fischer R
- Seltzer M
- Fischer M
- Publication year
External Links
Snippet
Many potentially useful web applications require use of user private data. In the typical client- server paradigm, the server must be trusted to respect the user's privacy, for the user's private data is sent to the server for processing. The Clilet system is a web application …
- 238000000034 method 0 abstract description 9
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Ye et al. | Trusted paths for browsers | |
US8719421B2 (en) | Cross domain interaction of a web application | |
KR101019938B1 (en) | Program instrumentation method and device for restricting the behavior of script embedded in documents | |
US8060932B2 (en) | Modular enterprise authorization solution | |
US9058489B2 (en) | Marking documents with executable text for processing by computing systems | |
US7200599B2 (en) | Automated generator of input-validation filters | |
US20090100321A1 (en) | Universal contextual actions menu across windows applications | |
US6662341B1 (en) | Method and apparatus for writing a windows application in HTML | |
US8020103B2 (en) | Using templates for ensuring visual consistency among portlets | |
US20090193497A1 (en) | Method and apparatus for constructing security policies for web content instrumentation against browser-based attacks | |
US20080295164A1 (en) | Mashup component isolation via server-side analysis and instrumentation | |
Kikuchi et al. | JavaScript instrumentation in practice | |
Spett | Cross-site scripting | |
Gross | Ajax patterns and best practices | |
Rykowski et al. | Virtual web services: application of software agents to personalization of web services | |
Anupam et al. | Secure web scripting | |
US20170131856A1 (en) | System and Method for a Hybrid User Interface for the Display of Analytical Data Related to Real-time Search Engine Optimization Issue Detection and Correction | |
Fischer et al. | Privacy from untrusted web servers | |
Wei et al. | A secure information flow architecture for web service platforms | |
Nabi | Designing a framework method for secure business application logic integrity in e-commerce systems | |
Sonowal | Characteristics of Phishing Websites | |
Kachhadiya et al. | Development of the security framework based on OWASP ESAPI for JSF2. 0 | |
Lathkar | Advanced Django | |
Asadollahy | Design and implementation of web components | |
Fredrikson | Lecture Notes on Web Security: Application Model & Same-Origin Policy |